Network Security
The internet has allowed for so many positive advancements in technology. Unfortunately, the worldwide connection also brought about advancements in malicious attacks that make networks vulnerable to a host of security breaches. Each kind of breach opens up a computer to a different threat. These breaches can be caused by everyday occurrences – websites, emails, even pinging. Awareness of security holes and vulnerabilities and attacks like phishing help organizations and individuals alike to keep their networks secure.
The ping technique is an excellent example of how a purposeful network tool can also be used maliciously. Pinging is done to test a network connection by sending a packet of information to a recipient and requesting a response. In a Ping Flood, packets are sent as quickly as possible and the response packets are discarded, overwhelming the recipient’s network, and resulting in a Denial of Service (DoS) attack (Ionos, 2022). DoS attacks cause the recipient’s website to be slow or unavailable for customers. This by itself can cause a company lost revenue, but the attack is usually a distraction to obtain information or to compromise the recipient’s network. Ionos recommends using cloud-based services to route this kind of traffic through data centers that provide firewalls and largely increased bandwidth to absorb DoS attacks (Ionos, 2022).
Security holes and vulnerabilities within your computer system are important to be aware of and address in order to protect your system. These can include Network Vulnerabilities (Wi-Fi access points, firewalls), Operating System Vulnerabilities (hidden backdoor programs), Human Vulnerabilities (user error, passwords), or Process Vulnerabilities (lack of controls), any of which can create an access point an attacker could use (Dosal, 2020). Once access to the network is gained, data could be stolen from the system, or malicious software could be installed to control it. These issues can slow or interrupt the way the network runs, damage a company’s reputation, and result in huge financial losses in resolving. The best ways to protect a computer system from security holes and vulnerabilities include keeping the operating system up to date, as updates close known security holes, and having strong security controls in place, which could include access reviews, password requirements, and required security training for all users.
The biggest vulnerability in a computer system is Human Vulnerability. No matter how secure the network is, attackers rely on human error to give them access to the network. One of the ways they do this is through Phishing. Phishing is a scam that tricks a user, typically though an email, to provide information. The user, believing the phishing attempt to be legitimate, provides information such as a password or financial information that the attacker then has access to (Vahid & Lysecky, 2019). The attacker could steal sensitive information through the phishing attempt, or use the information obtained to gain access to install malicious software onto the computer. The best defense is to be aware of what a potential phishing attempt looks like. Phishing emails have a startling message to create a sense of urgency for the user, knowing this allows the user to take pause and evaluate the authenticity of the email. Additional security measures should also be taken including using security software to detect threats and using multi-factor authentication to block an attacker’s access if they do obtain a password (Federal Trade Commission, 2022). Many companies do regular phishing exercises with their employees for good reason. These tests increase awareness of phishing and help a company to gauge the success of their current security practices.
Network security can feel daunting, as scammers are always finding new ways to access computer systems, but regular updates to systems and applications automatically allows them the most current defense possible. Strong security controls and keeping users educated and aware of current threats keeps a network well-armed against attacks and the dangers they can cause.
References
Dosal, E. 2020, March 10). Top 5 Computer Security Vulnerabilities. Compuquip.
https://www.compuquip.com/blog/computer-security-vulnerabilities
Federal Trade Commission. (2022, September). How to Recognize and Avoid Phishing Scams. Federal Trade Commission Consumer Advice. https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams
Ionos. (2022, September 20). Ping Flood. Ionos Digital Guide.
https://www.ionos.com/digitalguide/server/security/ping-flood/
Vahid, F., & Lysecky, S. (2019). Computing Technology for All. zyBooks.

Comments
Post a Comment